Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
32 Ergebnisse
Sortierung:
"The internet is powerful, but it is not safe. As "smart" devices proliferate the risks will get worse, unless we act now. From driverless cars to smart thermostats, from autonomous stock-trading systems to drones equipped with their own behavioral algorithms, the internet now has direct effects on the physical world. While this computerized future, often called the Internet of Things, carries enormous potential, best-selling author Bruce Schneier argues that catastrophe awaits in its new vulnerabilities and dangers. Forget data theft: cutting-edge digital attackers can now literally crash your car, pacemaker, and home security system, as well as everyone else's. In Click Here to Kill Everybody, Schneier explores the risks and security implications of our new, hyper-connected era, and lays out common-sense policies that will allow us to enjoy the benefits of this omnipotent age without falling prey to the consequences of its insecurity. From principles for a more resilient Internet of Things to a recipe for sane government oversight, Schneier's vision is required reading for anyone invested in human flourishing"--
World Affairs Online
Table of Contents -- Advance Praise for Liars and Outliers -- Title -- Copyright -- Credits -- A Note for Readers -- Chapter 1: Overview -- Part I: The Science of Trust -- Chapter 2: A Natural History of Security -- Chapter 3: The Evolution of Cooperation -- Chapter 4: A Social History of Trust -- Chapter 5: Societal Dilemmas -- Part II: A Model of Trust -- Chapter 6: Societal Pressures -- Chapter 7: Moral Pressures -- Chapter 8: Reputational Pressures -- Chapter 9: Institutional Pressures -- Chapter 10: Security Systems -- Part III: The Real World -- Chapter 11: Competing Interests -- Chapter 12: Organizations -- Chapter 13: Corporations -- Chapter 14: Institutions -- Part IV: Conclusions -- Chapter 15: How Societal Pressures Fail -- Chapter 16: Technological Advances -- Chapter 17: The Future -- Acknowledgments -- Notes -- References -- About the Author -- Index -- End User License Agreement
Up-to-the-minute observations from a world-famous security expertBruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon bombing, the NSA's ubiquitous surveillance programs, Chinese cyber-attacks, the privacy of cloud computing, and how to hack the Papal election. Timely as an Internet news report and always insightful, Schneier explains, debunks, and draws lessons from current events that are valuable for security experts and ordinary citizens alike.Bruce Schneier's worldwide reputation as a security guru has earned him more than 250,000 loyal blog and newsletter readers This anthology offers Schneier's observations on some of the most timely security issues of our day, including the Boston Marathon bombing, the NSA's Internet surveillance, ongoing aviation security issues, and Chinese cyber-attacksIt features the author's unique take on issues involving crime, terrorism, spying, privacy, voting, security policy and law, travel security, the psychology and economics of security, and much more Previous Schneier books have sold over 500,000 copiesCarry On: Sound Advice from Schneier on Securityis packed with information and ideas that are of interest to anyone living in today's insecure world.
ADVANCE PRAISE FOR LIARS AND OUTLIERS "A rich, insightfully fresh take on what security really means!" -DAVID ROPEIK, Author of How Risky is it, Really? "Schneier has accomplished a spectacular tour de force: an enthralling ride through history, economics, and psychology, searching for the meanings of trust and security. A must read." -ALESSANDRO ACQUISTI, Associate Professor of Information Systems and Public Policy at the Heinz College, Carnegie Mellon University "Liars and Outliers offers a major contribution to the understandability of these issues, and has the potential to help readers cope with the ever-increasing risks to which we are being exposed. It is well written and delightful to read." -PETER G. NEUMANN, Principal Scientist in the SRI International Computer Science Laboratory "Whether it's banks versus robbers, Hollywood versus downloaders, or even the Iranian secret police against democracy activists, security is often a dynamic struggle between a majority who want to impose their will, and a minority who want to push the boundaries. Liars and Outliers will change how you think about conflict, our security, and even who we are." -ROSS ANDERSON, Professor of Security Engineering at Cambridge University and author of Security Engineering "Readers of Bruce Schneier's Liars and Outliers will better understand technology and its consequences and become more mature practitioners." -PABLO G. MOLINA, Professor of Technology Management, Georgetown University "Liars & Outliers is not just a book about security-it is the book about it. Schneier shows that the power of humour can be harnessed to explore even a serious subject such as security. A great read!" -FRANK FUREDI, author of On Tolerance: A Defence of Moral Independence "This fascinating book gives an insightful and convincing framework for understanding security and
How does society function when you can't trust everyone?When we think about trust, we naturally think about personal relationships or bank vaults. That's too narrow. Trust is much broader, and much more important. Nothing in society works without trust. It's the foundation of communities, commerce, democracy--everything. In this insightful and entertaining book, Schneier weaves together ideas from across the social and biological sciences to explain how society induces trust. He shows how trust works and fails in social settings, communities, organizations, countries, and the world. In today's hy.
Sensible Security -- All Security Involves Trade-offs -- Security Trade-offs Are Subjective -- Security Trade-offs Depend on Power and Agenda -- How Security Works -- Systems and How They Fail -- Knowing the Attackers -- Attackers Never Change Their Tunes, Just Their Instruments -- Technology Creates Security Imbalances -- Security Is a Weakest-Link Problem -- Brittleness Makes for Bad Security -- Security Revolves Around People -- Detection Works Where Prevention Fails -- Detection Is Useless Without Response -- Identification, Authentication, and Authorization -- All Countermeasures Have Some Value, But No Countermeasure Is Perfect -- Fighting Terrorism -- The Game of Security -- Negotiating for Security -- Security Demystified.
In: Chronique ONU, Band 50, Heft 2, S. 13-14
ISSN: 2411-9911
In: UN Chronicle, Band 50, Heft 2, S. 13-14
ISSN: 1564-3913
In: Reason: free minds and free markets, Band 44, Heft 8, S. 65
ISSN: 0048-6906
In: Journal of privacy and confidentiality, Band 2, Heft 1
ISSN: 2575-8527
In: Bulletin of the Atomic Scientists, Band 63, Heft 2, S. 55-57
In: Fast Software Encryption; Lecture Notes in Computer Science, S. 191-204